Invalidating Security Compromised Nodes by Releasing its Energy in MANETs.
N. ChandrakantPublished in: SocProS (1) (2013)
Keyphrases
- topology control
- energy consumption
- energy conservation
- sensor nodes
- save energy
- wireless sensor networks
- routing protocol
- intermediate nodes
- wireless sensor nodes
- mobile nodes
- mobile ad hoc networks
- energy efficiency
- ad hoc networks
- information security
- sensor networks
- multi hop
- security issues
- energy saving
- access control
- intrusion detection
- residual energy
- statistical databases
- energy minimization
- network topology
- network layer
- network connectivity
- key management
- security policies
- security requirements
- wireless medium
- network security
- energy efficient
- inter domain
- service discovery
- packet forwarding
- data transmission
- malicious nodes
- source node
- wireless ad hoc networks
- directed graph
- routing algorithm
- network structure
- sink node
- power consumption
- wireless networks
- neighborhood information
- end to end delay
- wired networks
- base station